Kenna Security is now part of Cisco

|Learn more
Contact Us
Talk to an Expert
Request a demo

Kenna Blog

Thoughtful perspectives on Modern Vulnerability Management.

Power Couple: Kenna’s Vulnerability Intel + ServiceNow Vulnerability Response

Every once in a while, two things come together and create something new. Abbott and Costello. Johnny and June. Fred and Ginger. The whole becomes greater than the sum of its parts.
Read More
Sign up to get the latest updates
Kenna API

How to Work with Custom Fields: Part Two

Part Two of the API Guy's discussion focuses on vulnerability metadata .
READ MORE
Industry

From Gartner, a Future Defined by Risk and Resilience 

The Gartner Security & Risk Management Summit in Sydney revealed eight predictions made by leading cybersecurity experts.
READ MORE
Industry

Why CISA’s Directive 22–01 Is Only Half the Equation

CISA’s directive reflects a larger shift in the security industry towards risk-based vulnerability management.
READ MORE
Industry

5 Critical Take-Aways from ESG’s Cybersecurity Survey

"Security Hygiene and Posture Management," released in October, outlines key concerns and motivators across multiple security dimensions.
READ MORE
Industry

It’s Past Time to Secure Your Supply Chain

Modern supply chains, held together by a series of trusted relationships and digital handshakes, can be massively complex and difficult for cybersecurity...
READ MORE
Trending Vulns

Vuln of the Month Special Edition: What the End of Patch Tuesday Means for You

This special edition of our Vuln of the Month blog series is devoted to looking at the implications of Patch Tuesday’s demise.  
READ MORE

5 Things Every CIO Should Know About VM

Read this eBook to learn what a modern vulnerability management approach means to your IT operation. You discover how it helps CIOs like you create more efficient and effective teams while reducing your company’s overall risk profile.

Download Now
FacebookLinkedInTwitterYouTube

© 2022 Kenna Security. All Rights Reserved. Privacy Policy.